Archive for ‘Misc’


Where the Best-Paying Temp Jobs Are Now

It’s no surprise that so-called temporary jobs have been easier to get than permanent employment, years after the Great Recession ended. A new study shows that there’s a real boom in those no-ties jobs, for workers who have the right skills.

If you’re willing to take a shot, there’s even a chance of a permanent full-time job down the road.

That’s the message of a new report by CareerBuilder and Economic Modeling Specialists International (EMSI). They trawled through a database that pulls from more than 90 national and state employment resources to find out what jobs are in demand, and where they’re most likely to be found.

Here are the jobs in middle- to high-paying fields that are showing the most growth in demand in 2014. They’re listed in order of the greatest growth in openings, with the median hourly earnings they pay:

> Find a job as a Human resources specialist: $26.83

> Find a job as a Customer service rep: $14.70

> Find a job as a Construction laborer: $14.42

> Find a job as an Administrative assistant: $15.58

> Find a job as a Registered nurse: $31.48

> Find a job in Bookkeeping, accounting and auditing: $16.91

> Find a job in General maintenance and repair workers: $16.93

> Find a job as an Inspector, tester, sorter, sampler or weigher: $16.57

> Find a job as a Truck driver: $18.37

> Find a job as a Machinist: $18.99

> Find a job as a Sales rep or other sales professional: $24.45

> Find a job in Computer support: $22.32

All of those job categories show 3 percent to 4 percent growth in demand from 2013 to 2014.

If those job skills are in the highest demand, the general trend is clear. Nearly 3 million Americans were employed in temporary jobs in 2013, an increase of 28 percent since 2010, according to EMSI. That far outpaces the 5 percent growth rate for all jobs.

In a new Harris Poll commissioned by CareerBuilder, 42 percent of employers reported that they plan to hire temporary or contract workers in 2014, up from 40 percent last year.

Of these employers, some 43 percent plan to transition some of their temporary employees into full-time, permanent staff jobs.

“Coming off of a hard-hitting recession, companies want more flexibility in their workforce to quickly ramp up and ramp down their businesses as needed. Temporary workers provide that flexibility,” said Eric Gilpin, president of CareerBuilder’s Staffing & Recruiting Group, in a statement. “Temporary employment is growing across industries and metros, and providing great opportunities for workers to test-drive different work experiences and network with employers.”

CareerBuilder and EMSI also compiled a list of the metropolitan areas that are showing the fastest growth in temporary employment in 2014.

Grand Rapids, Michigan tops the list, with a projected 8 percent growth in the number of temporary job openings from 2013 to 2014, followed by Indianapolis, Indiana, at 7 percent.

Other hot metro areas included Seattle-Tacoma, WA, Orlando, FL; Riverside-San Bernardino, CA; Memphis, TN; Detroit, MI; Portland, OR, Chicago, IL; Los Angeles, CA; Dallas, TX, and Atlanta, GA.

Though the new study focuses on temporary jobs, its generally positive findings are echoed in the latest numbers on employment. Government data released last week showed the number of Americans filing for unemployment benefits the previous week close to a three-month low. Meanwhile, factory activity in the mid-Atlantic region rebounded.

Sent from my iPadc


Linux Foundation to support free web encryption project

Research Group (ISRG) on an open source encryption project, to create a free and simple way to secure web communications.

The non-profit Linux Foundation will host the Let’s Encrypt project on behalf of ISRG, and also provide general and administrative support services, as well as services related to fundraising, financial management, contract and vendor management, and human resources.

Let’s Encrypt is intended to create an open source alternative to Secure Socket Layer (SSL) certification, allowing web developers to use the HTTPS without payment or a long application process, something that has been an issue with SSL.

The Let’s Encrypt code will allow developers to automatically prove to the Let’s Encrypt certification authority that they control the website; obtain a browser-trusted certificate and set it up on their web server; keep track of when the certificate is going to expire, and automatically renew it; and help them to revoke the certificate if that ever becomes necessary.

A post on the project’s blog explained: “Anyone who has gone through the trouble of setting up a secure website knows what a hassle getting a certificate can be. Let’s Encrypt automates away all this pain and lets site operators turn on HTTPS with a single click or shell command.

Sent from my iPadc


Alcatel OneTouch unveils Smart Watch

The wrist-wear comes in several variants, including dark red and volcano black; all white; chrome and dark grey; and metal white. The Smart Watch is built from materials such as brushed chrome, micro-textured resin bands and white stainless steel, following a trend among vendors to have smartwatches appeal to consumers as fashion accessories first and devices second.

“Our emphasis has been on delivering incredibly wearable design, with an aesthetic quality that integrates perfectly with everyday life, all at the right price point,” said Zied Merichko, head, Middle East, Alcatel OneTouch.

“The Smart Watch’s design has won a number of awards with premium quality that doesn’t break the bank. We’ve kept things fashion-forward while also delivering on innovative features. The UI has been carefully honed and retooled so users in the Middle East can intuitively take the Smart Watch’s multifunctional ability to work, the gym, and even to sleep.”

Sent from my iPadc


تهافت على أبل ووتش قبل إطلاقها

These graphics is published with the permission of GRAPHIC NEWS April 10, 2015 — Soaring online demand for Apple’s new Watch wearable device has forced the tech giant to push back delivery dates from April 24 to June.


Amazon PrimeAir drone deliveryman جهاز أمازون الطائر لتسليم البضائع برايم إير

These graphics is published with the permission of GRAPHIC NEWS

March 25, 2015 — Amazon, the largest e-commerce company in the U.S., wants to use autonomous drones to deliver packages to customers but, frustrated at the slow pace of drone legislation by the Federal Aviation Administration, is testing its Prime Air system in countries more favourable to drones.


Messenger Business will change customer service – no more calling businesses – Zuckerberg at F8

The premise is this: When consumers make a purchase online, it’s in efficient. It’s a flood of emails including purchase confirmation and shipping info, and they’re all on separate threads generated from different tasks. Clicking on any of those emails directs to a website — it’s a situation Facebook’s VP of messaging product David Marcus called “inconvenient on desktop” and “barely usable” on mobile.

With Messenger Business, all information related to the purchase comes in on one thread, along side users’ other messages. Within that thread, users can change an order, track the package, receive a receipt, or even just ask if that recently-purchased shirt comes in black, Marcus said.

As part of the F8 opening keynote, Zuckerberg also announced Messenger Platform, which will let apps makers send content through Messenger.

It also includes integration with more than 40 apps like JibJab, Dubsmash, and others that allow for the inclusion for various types of rich content like gifs, video, animations, and more, into the Messenger app.
It will include sending money to each other through the app, as well as other additions integrations like stickers, video, voice calling, and locations.


History of HTTP – HTTP/2: Is it the next HTTP?

The Hypertext Transfer Protocol(HTTP) is the underlying request-response protocol used by theWorld Wide Web. The first documented version of HTTP, HTTP/0.9, appeared in 1991. Then, 1996 saw the introduction of HTTP/1.0, quickly followed byHTTP/1.1 in January 1997. Further improvements and updates were released in 1999; this is the version of HTTP most commonly used today.

A big difference between HTTP/1.0 and HTTP/1.1 is that the latter can reuse a connection multiple times to download page content, making load times a lot quicker, as there is no need to establish a new connection for each page resource. The need for ever-quicker content delivery times in today’s connected, bandwidth-intensive, mobile world, though, means HTTP/1.1 is no longer deemed fast nor efficient enough.

The Internet Engineering Task Force is responsible for developing and promoting voluntary Internet standards, and it is close to finalizing and making HTTP/2 a formal Internet specification. HTTP/2 is primarily focused on improving the time it takes to render a page; it allows servers to send all the different elements of a requested webpage at once, eliminating the serial sets of messages that still have to be sent back and forth with HTTP/1.1. It also allows the server and the browser to compress HTTP content, reducing the volume of data that needs to be sent, and reducing the number of network roundtrips required to render a page.

HTTP/2 is based largely on the SPDY protocol developed by Google, which can reduce the time it takes to deliver a webpage by 50% or more. High-volume sites such as Google, Facebook and Twitter already use the SPDY protocol. Google’s ads are also served from SPDY-enabled servers, but it is currently only used by 1% of all websites, according to W3techs. Chrome, Safari, Firefox, Opera, Amazon Silk and Internet Explorer browsers already support SPDY.

HTTP/2 is not a ground-up rewrite of the protocol, so it supports the same semantics as HTTP/1.1. This means the code of enterprise Web applications won’t need updating to benefit from the new protocol, only client and server software will. However, note that servers will be fielding many more requests, as clients can send requests more quickly, so caching and load-balancing services may need upgrading due to the need to commit more resources to each connection.

HTTP/2 provides an effective compression algorithm that is tailored to HTTP and avoids many of the security issues with using general purpose compression algorithms over TLS connections. Some concerns have been raised about a possible distributed denial-of-service attack vector because attackers could find ways to abuse the new method for handling header content if browser and software vendors fail to interpret and implement the protocol correctly. However, note that there are implementation risks with any new protocol. Web security gateways may need their rules and filters updated to handle the larger amount of data that will be within the headers received when users on the internal network request content from a website.

Those organizations that run highly visible websites should start trialing Google’s SPYD module for Apache so that they can assess the likely effects of HTTP/2 on their own infrastructure once it’s officially formalized later this month. As with any new technology or protocol, IT teams should follow the relevant security forums to stay abreast of any developments, as well as pick up tips of how others are integrating it into their environment.


Samsung Electronics has developed a flash memory storage with 128GB in cheaper smartphones and tablets

The new 3-bit NAND-based Embedded MultiMediaCard (eMMC) 5.0 storage is the industry’s highest-density architecture of its kind and will put larger storage capacities into mass market mobile devices, the company said Thursday.

The development adds to the allure of budget smartphones, which have recently improved in features and capabilities to such an extent that they may make it hard to decide whether buying higher-end models is worthwhile.

The most expensive versions of smartphones and tablets such as the iPhone 6 or iPad Air have 128GB storage, and are currently available for about $200 more than the 16GB editions. Samsung would not say how much the 128GB eMMC 5.0 would cost and how that might affect device pricing.

The eMMC storage is already found in less expensive mobile devices. The new Samsung technology has some nifty features such as 260 megabytes per second of sequential data reading and it can support HD video processing. The storage is already in mass production and available to device manufacturers, Samsung said.

An embedded non-volatile memory system, eMMC consists of integrated flash memory and a flash memory controller. It’s designed for use in phones, tablets, car navigation systems and other devices.

“We expect to see that mid-to-low-end smartphones will increasingly adopt 128GB of memory storage in the near future,” a Samsung spokesman said via email.

The JEDEC Solid State Technology Association recently approved eMMC version 5.1, which will allow flash drives to handle 4K streaming and other data-intensive tasks.


UAE is top-two victim of regional cyber attacks

The UAE is the second most attacked country online in the Middle East, according to study by Kaspersky Lab.

Speaking today at a conference to announce the launch of Kaspersky Total Security – multi-device, Mohammad Amin Hasbini, senior security researcher, Global Research and Analysis Team (GReAT), Kaspersky Lab Middle East, Turkey and Africa, highlighted the issue of cybercrime and bullying and added that the UAE is the 15th most attacked country worldwide.

According to the study conducted by Kaspersky lab and B2B international in the UAE, 40% of parents said they are worried about cyberbullying, and 48% reported to have intervened to protect their child from being cyberbullied. Another study called “children online” found that more than half of young users in the UAE encountered adult content; over 22% landed on websites dedicated to gambling; and every sixth user stumbled across sites featuring weapons.

Dr. Samineh Shaheem, Assistant Professor of Psychology and founder of “Bolt down on bullying” campaign, said: “Our children are exposed to so much content online, the internet has many wonderful benefits but there are issues and concerns which we can’t turn a blind eye to. Previously when we didn’t have the internet we thought our children we safe at home but now with a device in their hand they have access to an entire world that might be dangerous.”

The recent research shows an average household now has more than five connected devices and it is not just children who are at risk. Early this year, Kaspersky Lab experts alerted users about malware delivered through politically-oriented news or social networking forums using social engineering tactics to gain full access and control over the victim’s devices and files.

Users should also be aware of threats aimed at exploiting mobile gamers, for instance, the popular “Gomal Trojan” was known to be camouflaged as an innocent game of tic-tac-toe. The game carried within it spyware functionality to record sounds, process calls and steal SMS information. With 92% of users in the UAE reported to trust their computers and smartphones to store both corporate, personal and financial data, the malware could easily lead to financial or identity theft.

Ovanes Mikhailov, managing director, Kaspersky Lab Middle East said: “Families today need mutli-platform solutions that integrate a full range of features and tools that allow them to provide comprehensive protection from all these vulnerabilities without the hassle of managing and operating disparate, individual consoles. Kaspersky Total Security – multi-device can help protect not just their information but also safeguard their children.

“The solution enables comprehensive, multi layered protection across a range of devices allowing real time protection and monitoring of the cyber landscape and related cyber activity. To help parents better protect their children the solution comes with a parental control feature that can limit the number of hours children spend online in addition to monitoring activity online and on social media platforms,”


First look: VMware vSphere 6 keeps its edge

In the not so distant past, VMware held a long and commanding lead in the server virtualization space, offering core features that were simply unmatched by the competition. In the past few years, however, competition in virtualization has been fierce, the competitors have drawn near, and VMware has been left with fewer ways to distinguish itself.

The competition may have grown over the years, and VMware may not enjoy quite as large a lead as it once did — but it still enjoys a lead. With useful improvements to a number of key features, as well as the bundling of functions such as backup and recovery that were previously available separately, vSphere 6 is a worthy addition to the vSphere line. That said, some of the major advances in this version, such as long-distance vMotion, will matter most to larger vSphere shops.

Big changes in vSphere 6

The big changes in vSphere 6 revolve around expanded resource limits, enhanced vMotion capabilities, a more complete version of the Linux-based vCenter Server Appliance, storage offloading and enhancements to the Web client. In addition, VMware has bundled extra technologies into vSphere 6, such as the vCenter Director content library that is used to store ISO images, templates, scripts, OVF files and other elements, and to automatically distribute them across multiple vCenter servers. The Data Protection Advanced backup and recovery tools are now included as well.

VMware vSphere 6 offers advances in the previously existing Fault Tolerance feature. Fault Tolerance is the technology by which a single VM can have presence on multiple physical servers simultaneously. Should the physical server running the active instance fail, the secondary instance is immediately activated. Without Fault Tolerance, the VM could be automatically restarted on another host, but would require time to detect the failure and boot on the new host. With Fault Tolerance, that step is avoided.

In previous versions of vSphere, Fault Tolerance supported only a single vCPU per VM and four fault-tolerant VMs per host. In vSphere 6, the limits are now four vCPUs per VM and either eight vCPUs or four VMs per host.

Long-distance vMotion

The vMotion improvements will be more germane to those with multiple data centers spread over wide geographic areas. Prior to vSphere 6, live-migrating VMs over large distances was problematic and required high bandwidth and low-latency connections to succeed. In vSphere 6, the network tolerances have been extended, and vMotions can now be completed over links with 100ms latency or less, requiring 250 megabits of bandwidth per vMotion.

In addition, VMs can be vMotioned between vCenter servers, and with a proper underlying infrastructure, vMotions can be completed without common shared storage. There are restrictions that come with these expanded capabilities, mostly in the form of proper network layouts at each side to allow for proper communication of the VMs on each network.

The ESXi 6.0 hypervisor in vSphere 6 can handle up to 64 physical hosts per cluster, up from 32 hosts, and each instance can now support up to 480 CPUs, 12TB of RAM and 1,000 VMs. Each VM can now be run with up to 128 vCPUs and 4TB of RAM, with vNUMA hot-add memory capabilities.

VMware vCenter Server improvements

On the management side, the vCenter Server Appliance is now feature-complete, on par with its Windows counterpart. Previously, you could run the Linux-based vCenter Server Appliance and manage ESXi hosts, but some of the more advanced features (notably Update Manager) of the Windows-based vCenter Server were not available. As of vSphere 6, the appliance can handle all the tasks that a Windows installation can. This is significant news to those who prefer to not manage a Windows server to run vCenter.

Those who run vCenter Server on Windows will notice that the installation procedure is simplified, though it takes quite a while to complete. All of the moving parts that make up vCenter Server are installed in a single action now, including the new Platform Services Controller, which handles SSO, licensing and certificate management. vCenter Server can be deployed with all components on a single system, or it can be split across multiple systems with the Platform Services Controller and vCenter Server installed separately.

Both vCenter Server for Windows and the vCenter Server Appliance now use a local PostgreSQL database by default, though external Microsoft SQL Server and Oracle databases are also supported on Windows and Oracle databases on the appliance. The switch to PostgreSQL will be important to those running with local databases on earlier versions of vSphere due to the fact that the limitations of the previous Microsoft database are no longer present; thus, local databases can now support 1,000 hosts and 10,000 VMs.


Forwarding calls from Etisalat mobile

Mobile Commands:

Forward all calls
To activate
Press: *21*number# OK.
To deactivate
Press: #21# OK.

Forwarded when busy
To activate
Press: *67*number# OK.
To cancel
Press: #67# OK.

Forwarded when out reach or switched off
To activate
Press: *62*number# OK.
To cancel
Press: #62# OK.

Forwarded when after a few rings there is no response
To activate
Press: *61*number# OK.
To cancel
Press: #61# OK
To deactivate all calls forwarding
Press: #002# OK.


Microsoft Azure delivers NoSQL storage via DocumentDB

Data is a forever growing and seemingly never-ending organizational resource (anyone else tired of hearing about big data?). Modern applications must be able to efficiently and quickly work with these data sets where many are unstructured, thus traditional (or relational) methods do not apply.

The NoSQL label emerged for technologies to work with these data sources, whether they are object stores, key-value pairs, graph databases, or document storage and so forth. This takes me back to my days of working with a true NoSQL workhorse: Lotus Notes


Why HTTPS and SSL are not as secure as you think

In this day and age of well-known NSA spying, everyone keeps saying that the only way to be safe is to use SSL/TLS, commonly known as “browsing with https://“.

The sad reality is that HTTPS does virtually nothing to protect you from the prying eyes of alphabet soup agencies – or anybody else with enough knowledge about how these supposedly “secure” connections actually work.

I have said it before, and I’ll say it again: There never was security or privacy on the internet, there is no security or privacy on the internet now, and most likely there never will be. Not unless some very big changes are made…

And do you know why all this (and much, much more) is possible?

Because just like you, I had no knowledge of the gaping holes in SSL. Awareness of this and many other issues – technological, political, psychological, social, etc. – is absolutely essential.

Otherwise, frankly, we’re screwed.

It’s true that connecting to web sites with SSL will certainly prevent “script kiddies” and other more winky opponents from eavesdropping on your surfing or otherwise interfering in your affairs. BUT as for the Real Bad Guys, forget it…

We shall begin by taking a brief dive down the rabbit hole of SSL, hopefully in a way that will make sense to even the least technically inclined among us.

This issue is, after all, so extremely important that I think everyone needs to understand what is really going on, and how web security actually works, without needing a PhD in cryptography, computer science, or engineering!

Our story begins with a little e-mail I received the other day. The basic message can be found here:

Microsoft Security Advisory (2880823)

From the above link, we read:
Microsoft is announcing a policy change to the Microsoft Root Certificate Program. The new policy will no longer allow root certificate authorities to issue X.509 certificates using the SHA-1 hashing algorithm- and use SHA-2 – for the purposes of SSL and code signing after January 1, 2016. Using the SHA-1 hashing algorithm in digital certificates could allow an attacker to spoof content, perform phishing attacks, or perform man-in-the-middle attacks.

MD5 considered harmful today: Creating a rogue CA certificate

SSL Web Site Certificate

Using HTTPS is not only for encryption of communications, but also a way to verify that the site you are communicating with is the Real Thing, and not an imposter.

Now, where do these hash algorithms like MD5, SHA-1, and SHA-2 come into play?

All certificates contain information, like:

  • Web site domain (
  • Site location (country, state, etc.)
  • Site owner info (company name)
  • Period of validity

This information is verified before a certificate is issued. Once verified, a hash of the data is generated. This hash acts as the digital signature for the certificate.

Right. There is such a thing as a “hash collision”. This is when you have 2 hashes that are identical, but they were generated from different data. That’s like if you and your neighbor suddenly had the same thumbprint. OOPS!

This is exactly what happened with the MD5 SSL attack, a Man-in-the-Middle attack.

In other words, SSL / HTTPS means that the connection between your browser and the destination server at the URL you’re visiting is supposed to be encrypted. But due to the fact the certain types of SSL certificates (which help handle the encryption) can be forged, an attacker could set up their fake server that pretends to the be the real destination server, and thus insert themselves in the middle of the connection. When that is done, the attacker has control over the connection and the data, and can thus decrypt your data, manipulate it, and/or pass it on to the real intended destination server.

Now, isn’t that a daisy?

“But wait!” Even you signed using SHA-2, you are still unsafe.


In order for the “security” to actually be more secure, everyone must upgrade right now. But this isn’t going to happen.

Because all it takes is for ONE Certificate Authority to use a “weak” hash algorithm, and someone who is up to no good can generate a forged CA Root Certificate. Once they have that, they can generate as many SSL Web Site Certs as they want – using any hashing algorithm they please – including a fake-yet-valid cert that they can use to impersonate your “secure” site!

In other words, the weakness in the hashing algorithm is just the tip of the iceberg. Due to the hierarchical “chain of authority” in the whole certificate system, if anyone manages to create a false CA Root Cert, they are more or less god in terms of creating false SSL Web Site Certs.

Now, if that isn’t bad enough, think about all the NSA spying. Think about how many people said, “Naw, man, I just surf using HTTPS, and I’m totally safe!”

Guess who invented the SHA-1 hash algorithm in 1995?

The NSA.

Guess who invented SHA-2 in 2001?

The NSA.

So, why should all the Certificate Authorities switch from the NSA’s SHA-1 to the NSA’s SHA-2? Why, because the NSA created it the way they did for a reason!

SHA-1 already has been theoretically breached, and there are a few indications that SHA-2 isn’t quite as super-duper-safe as everyone thinks.

Imagine you are the NSA. You want to spy on everyone, everyone’s grandmother, the grandmothers’ cats, and the mice that are currently being digested inside the cats. SSL is kind of a problem… It can use pretty annoying encryption. Well, hell! No problem. Just compromise the “certificate authority chain” by forging one little CA Root Certificate, and blammo! You can eavesdrop and man-in-the-middle anybody you darn well please, SSL or not!

Web sites over SSL? No problem.

E-mail over SSL? No problem.


5 Reasons NOT To Buy An Apple Watch!


Should you buy an Apple Watch or not? I have to admit that I am excited about the launch of the Apple Watch, even though it appears almost 2 years later than Ioriginally predicted. I love gadgets and I love data and the watch will surely be a gadget and will help to collect a lot of data. But before we all get ready to go stand in line to buy one, it might be worth considering the reasons why you might NOT want to buy one.

When it comes to gadgets these days — that can practically tweet your doctor when they sense you’re coming down with a cold — I think it pays to look at both the pros and the cons of being an early adopter. And for me – I’m afraid – the cons slightly outweigh the pros at this point.

Here are my top five reasons for NOT buying an Apple watch (yet):

  1. A lot of sensitive data in the hands of a commercial giant. Of course, I’m a data guy, so my first question is this: would we really be happy with a corporation collecting and storing so much personal data – activity levels, geographic position, calorie intake, heart rate, sleep data etc.? Is it really clear who owns and can access our data? Do we really trust Apple and Apple’s systems to be hacker proof?
  2. Features (or lack thereof). Let’s be honest: What a smart watch really does at this point is tell you to look at your phone. I have no doubt that as the technology develops, the uses and usability will grow, but for now, it’s a bit of an expensive status symbol for early adopters. And speaking of status symbols…
  3. It won’t replace your Rolex. For lots of people, the watch they wear is a status symbol. Especially men who sport luxury watches become a part of a sort of brotherhood of the successful and well accessorized. The Apple Watch is not likely to buy you into that club any time soon. And people who are already accustomed to wearing their status watch are not likely to down-trade, no matter how sleek the design or cool the image.
  4. You don’t necessarily want to be an early adopter. Remember the first iPod? Compare that to the latest generation iPod Touch, or even the iPhone — they’re like two completely different products. When the first iPhone launched, there was no app store, so it couldn’t do a whole lot other than look super cool. Smart watches are no different. If they catch on, they’ll get better and better, and the improvements will come quickly. You don’t necessarily want to be stuck with a $300 first gen model when the much faster, cheaper, better models start rolling out.
  5. You already have something better. It can tell the time, give you directions, track how many steps you take, and make phone calls. And if you really want to, you can buy a smart armband to track your body functions. Your smart phone is about a thousand times more powerful and more useful than any smart watch at this point, so you might be better off just sticking with that — for now.

I am all for gadgets but I want them to primarily be useful not just look cool. If I had to make a prediction, I’d guess that smart watches will develop at least one amazing application that will soon convince me to buy one, but until then I will stick to my phone.



These graphics is published with the permission of GRAPHIC NEWS


Get every new post delivered to your Inbox.

Join 242 other followers